scholarly journals Data (Video) Encryption in Mobile devices

2017 ◽  
Vol 2 (3) ◽  
pp. 32-39
Author(s):  
Aya Khalid Naji ◽  
Saad Najim Alsaad

In the development of 3G devices, all elements of multimedia (text, image, audio, and video) are becoming crucial choice for communication. The secured system in 3G devices has become an issue of importance, on which lot of research is going on. The traditional cryptosystem like DES, AES, and RSA do not able to meet with the properties of the new generation of digital mobile devices. This paper presents an implementation of video protection of fully encrypted using Elliptic Curve   Cryptography (ECC) on a mobile device. The Android platform is used for this purpose.  The results refer that the two important criteria of video mobile encryption: the short computation time required and high confidentially are provided.

2019 ◽  
Vol 20 (2) ◽  
pp. 349-364
Author(s):  
S. Velliangiri ◽  
R. Rajagopal ◽  
P. Karthikeyan

In the Hybrid cloud deployment model, security is essential to restrict access while using resources such as virtual machine, platform, and application. Many protocols were developed to provide security via the cryptography technique, but these protocols rarely considered the trust factor which is an essential factor for cloud security. The existing Elliptic Curve Cryptography and Diffie Hellman key distribution mechanism failed to stress the trust factor, and further, they have provided not only higher complexity but also lower security and reliability. The proposed method comprised two stages: first stage, Group Creation using the trust factor and develop key distribution security protocol. It performs the communication process among the virtual machine communication nodes. Creating several groups based on the cluster and trust factors methods. The second stage, the ECC (Elliptic Curve Cryptography) based distribution security protocol is developed. The proposed Trust Factor Based Key Distribution Protocol reduced error rate, improve the key computation time and maximize resource utilization.


2018 ◽  
Vol 7 (4.7) ◽  
pp. 311
Author(s):  
M. SandhyaRani ◽  
T. Sivaprasad

In this paper an approach for secured transmission of images and its implementation is being proposed.  The proposed method proves to be better compared to various presently existing cryptographic algorithms. The basic application of this algorithm is to provide secured transmission of digital images for various multimedia usages. These encrypted messages can further be used for compact storage of information of patient details which are very much confidently for patient centric approach. The results of the implementation show that the computation time is faster comparatively and it is highly secured and also efficient method for image transmission. The input for demonstration is taken as Lena image on which the Elliptic Curve Cryptography method is applied. The major advantage of this approach is reduced key size.  


2015 ◽  
Vol 713-715 ◽  
pp. 2544-2547
Author(s):  
Xu Dong Wu

With the development of communications equipment network and computer science, new generation of mobile end-user has higher requirements for the functionality and performance of mobile devices. Because Android intelligent platform occupies the first place in market share with its inherent advantages, the design of music player based on Android platform has a great significance. Firstly, This paper studies the Android platform architecture theory, fully understands the theoretical basis of the Android platform, the platform's technical framework and advantages; secondly, describes the system structural design of the music player; finally, based on the structural design describes the detailed design for music player, including design principles and implemented functions. The design of music player based on Android platform makes the mobile devices more lively and flexible, and makes people's lives more diverse.


2018 ◽  
Vol 29 (2) ◽  
pp. 106 ◽  
Author(s):  
Aya Khalid Naji

The security of video applications in mobile devices has become recently an important field research. Dealing with video data, which is large compared to text and image and processing it in the mobile platform is a big challenge. Generally, the efficiency of any video encryption algorithm is concerned with two criteria, the computational time required to process video data, and the memory usage according to the resources on the smartphone. The secured system in 3G devices has become a matter of importance. This paper presents an implementation of full video encryption using Elliptic Curve Cryptography (ECC) on a mobile device. The operations on ECC include doubling and addition on the finite field as the backbone for an elliptic curve. Also, mapping representation is introduced to convert every byte of plain video into a point on EC. The paper proposed multi-keys instead of using one key as usual. Also, Chaotic Key Generator (CKG) is exploited for the randomness of the multi-keys. The proposed work focuses on increasing the security with multi-keys and to get acceptable time for encryption and decryption in a limited environment like mobile. The system is implemented using Android Studio with version (3.0) and using java language, it is implemented on Android version 7.0 (Nougat) and on mobile Galaxy S8.


Author(s):  
Sachin P. Godse ◽  
Parikshit N. Mahalle

<p class="abstract">A recent development in the adhoc network is a vehicular network called VANET (Vehicular Adhoc Network). Intelligent Transportation System is the Intelligent application of VANET. Due to open nature of VANET attacker can launch various kind of attack. As VANET messages are deal with very crucial information’s which may save the life of passengers by avoiding accidents, save the time of people on a trip, exchange of secret information etc., because of this security is must be in the VANET. To ensure the highest level of security the network should be free from attackers, there by all information pass among nodes in the network must be reliable i.e. should be originated by an authenticated node. Authentication is the first line of security in VANET; it avoids nonregistered vehicle in the network. Previous research come up with some Cryptographic, Trust based, Id based, Group signature based authentication schemes. A speed of authentication and privacy preservation is important parameters in VANET authentication. This paper addresses the computational analysis of authentication schemes based on ECC. We started analysis from comparing plain ECC with our proposed AECC (Adaptive Elliptic Curve Cryptography) and EECC (Enhanced Elliptic Curve Cryptography). The result of analysis shows proposed schemes improve speed and security of authentication. In AECC key size is adaptive i.e. different sizes of keys are generated during key generation phase. Three ranges are specified for key sizes small, large and medium. In EECC we added an extra parameter during transmission of information from the vehicle to RSU for key generation. Schemes of authentications are evaluated by comparative analysis of time required for authentication and key breaking possibilities of keys used in authentication.</p>


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2126
Author(s):  
Muhammad Rashid ◽  
Malik Imran ◽  
Asher Sajid

This work presents an efficient high-speed hardware architecture for point multiplication (PM) computation of Elliptic-curve cryptography using binary fields over GF(2163) and GF(2571). The efficiency is achieved by reducing: (1) the time required for one PM computation and (2) the total number of required clock cycles. The required computational time for one PM computation is reduced by incorporating two modular multipliers (connected in parallel), a serially connected adder after multipliers and two serially connected squarer units (one after the first multiplier and another after the adder). To optimize the total number of required clock cycles, the point addition and point double instructions for PM computation of the Montgomery algorithm are re-structured. The implementation results after place-and-route over GF(2163) and GF(2571) on a Xilinx Virtex-7 FPGA device reveal that the proposed high-speed architecture is well-suited for the network-related applications, where millions of heterogeneous devices want to connect with the unsecured internet to reach an acceptable performance.


Sign in / Sign up

Export Citation Format

Share Document